Restrict Outside Network Access

Posted on 2009-04-29
Last Modified: 2012-05-06
I am starting to get contractors in our facility after hours that are pluggin laptops into open jacks on our shop floor in order to do xyz functions. What I would like to do (if possible) is collect all of the mac address that I know are valid and create some sort of list or table to authenticate against. That way if someone from the outside try to plug in they will get denied.

I am running a windows 2003 server. If this can be done can someone provide a step by step instruction.
Question by:djp12345
    LVL 3

    Expert Comment

    If you are running a Cisco  switch, I'd advise sticky mac addresses, and shutting down the unused ports.

    Author Comment

    I can't shut down the unused ports. There are times for example one of our maintenace guys would have to plug into one to look at a machine or something (until I install wireless this is not an option).
    LVL 3

    Accepted Solution

    Are you using a Cisco switch?  Another option would be a mac-address access list.  Is your network running DHCP?  If it's static, you could apply a standard ip access-list at the router allowing only the current machines, plus one more ip address for the maintenance guy(s).

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Join & Write a Comment

    Usually shares are where we want them for our users and we tend to take them for granted. There are times, however, when those shares may disappear causing difficulty for your users. One of the first things to try is searching for files that shou…
    The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now